Network Security Unit 3
Network Security Unit 3
Network Security Unit 3
Responsibilities:
Common Use-Cases:
Benefits:
Limitations:
1. It has low visibility in IoT devices and devices with no specific users
associated with it.
2. It does not protect from threats present inside the network.
3. It may not work for organizations if it is not compatible with existing
security controls.
1.Access Requestor(AR).
2.Policy Servers.
2.Policy Server:
Thus, these were the Three Principle Elements of NAC (Network Access control).
Uses of IP Security
Components of IP Security
IP Header
IPSec (IP Security) architecture uses two protocols to secure the traffic or data
flow. These protocols are ESP (Encapsulation Security Payload) and AH
(Authentication Header). IPSec Architecture includes protocols, algorithms,
DOI, and Key Management. All these components are very important in order to
provide the three main services:
Confidentiality
Authenticity
Integrity
Working on IP Security
The host checks if the packet should be transmitted using IPsec or not. This
packet traffic triggers the security policy for itself. This is done when the
system sending the packet applies appropriate encryption. The incoming
packets are also checked by the host that they are encrypted properly or
not.
Then IKE Phase 1 starts in which the 2 hosts( using IPsec ) authenticate
themselves to each other to start a secure channel. It has 2 modes. The Main
mode provides greater security and the Aggressive mode which enables the
host to establish an IPsec circuit more quickly.
The channel created in the last step is then used to securely negotiate the
way the IP circuit will encrypt data across the IP circuit.
Now, the IKE Phase 2 is conducted over the secure channel in which the
two hosts negotiate the type of cryptographic algorithms to use on the
session and agree on secret keying material to be used with those
algorithms.
Then the data is exchanged across the newly created IPsec encrypted
tunnel. These packets are encrypted and decrypted by the hosts using IPsec
SAs.
When the communication between the hosts is completed or the session
times out then the IPsec tunnel is terminated by discarding the keys by both
hosts.
Features of IPSec
Advantages of IPSec
Disadvantages of IPSec
The keys will be created or generated based on the demand or requirement. This
method is suitable for large and distributed systems. Automated Key Exchange
has two main methods:
IKE Phase-1
There will be two devices i.e. sender and receiver. Initially, the sender will
exchange the proposals for security services like encryption algorithms.
authentication algorithm, hash function, etc. The sender and receiver will form a
security association which is a collection of parameters that the two devices use.
Here, the ISAKMP session is established and called the ISAKMP tunnel or
Internet Key Exchange(IKE) Phase-1 tunnel which is bi-directional. When both
ends of the tunnel agree to accept a set of security parameters, Phase-1 is done.
IKE Phase-2
There will be two devices i.e. sender and receiver. Once the sender and receiver
established the ISAKMP tunnel in phase-1 they move to phase-2. phase-2 always
operates in Quick mode. Here the security associations and services between the
two devices are negotiated. The devices will choose which
protocol(Authentication Header or Encapsulation Security Protocol) and which
algorithm to use.
Transport Level Security (Tls):
Web Security Considerations:
The World Wide Web is fundamentally a client/server application
running over the Internet and TCP/IP intranets.
The following characteristics of Web usage suggest the need for tailored
security tools:
Web browsers are very easy to use, Web servers are relatively
easy to configure and manage, and Web content is increasingly
easy to develop, the underlying software is extraordinarily
complex.
A Web server can be exploited as a launching pad into the
corporation’s or agency’s entire computer complex.
Casual and untrained (in security matters) users are common
clients for Web based services.
provides security to the data that is transferred between web browser and server.
SSL encrypts the link between a web server and a browser which ensures that all
data passed between them remain private and free from attack.
Handshake protocol
Alert protocol
Confidentiality
Message Integrity
In the SSL Record Protocol application data is divided into fragments. The
fragment is compressed and then encrypted MAC (Message Authentication
Code) generated by algorithms like SHA (Secure Hash Protocol) and MD5
(Message Digest) is appended. After that encryption of the data is done and in
last SSL header is appended to the data.
Handshake Protocol:
Handshake Protocol is used to establish sessions. This protocol allows the client
and server to authenticate each other by sending a series of messages to each
other. Handshake protocol uses four phases to complete its cycle.
Phase-3: In this phase, Client replies to the server by sending his certificate
and Client-exchange-key.
Change-cipher Protocol:
This protocol uses the SSL record protocol. Unless Handshake Protocol is
completed, the SSL record Output will be in a pending state.
After the handshake protocol, the Pending state is converted into the
current state.
Change-cipher protocol consists of a single message which is 1 byte in
length and can have only one value.
This protocol’s purpose is to cause the pending state to be copied into the
current state.
Alert Protocol:
This protocol is used to convey SSL-related alerts to the peer entity. Each
message in this protocol contains 2 bytes.
The advantage of this approach is that the service can be tailored to the
specific needs of the given application.
Versions of SSL:
SSL (Secure Sockets Layer) certificate is a digital certificate used to secure and
verify the identity of a website or an online service. The certificate is issued by a
trusted third-party called a Certificate Authority (CA), who verifies the identity
of the website or service before issuing the certificate.
The SSL certificate has several important characteristics that make it a reliable
solution for securing online transactions:
1. Encryption: SSH encrypts the data exchanged between the client and
server, ensuring that even if someone intercepts the communication, they
cannot decipher the content.
2. Authentication: SSH provides various methods of user authentication,
including password-based authentication, public key authentication, and
more. Public key authentication is often preferred for its security benefits.
3. Secure Remote Access: One of the primary use cases for SSH is secure
remote access to servers or network devices. Users can log in to a remote
system and execute commands as if they were physically present at the
machine.
4. Secure File Transfer: SSH includes secure file transfer capabilities,
allowing users to transfer files securely between the client and the server
using tools like SCP (Secure Copy Protocol) or SFTP (SSH File Transfer
Protocol).
5. Tunneling: SSH supports tunneling, which allows the creation of
encrypted channels for forwarding other network services. This can be
used to secure various applications, such as database connections or web
browsing.
6. Port Forwarding: SSH can forward traffic from one port on a local
machine to another port on a remote machine, creating a secure
communication channel even for services that might not inherently support
encryption.
7. Key Management: SSH utilizes key pairs for authentication. Users can
generate public and private key pairs, with the public key stored on the
server and the private key securely held by the user. This enhances security
and eliminates the need for password-based logins.